Research Article
Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications
Table 2
The 13-component interaction matrix of the support and the main design and implementation processes of cryptography algorithms.
| | | Main process | Level 1 | | Cryptography algorithms | Level 2 | | Application | Theoretical basis | Implementation | Evaluation | Level 3 |
| | Support process | Software | Culture | 5 | 6 | 5 | 2 | . | | Organization/structure | 8 | 7 | 7 | 7 | . | | International and public relations | 5 | 4 | 4 | 7 | . | | Financial resources | 7 | 6 | 7 | 6 | . | | Human resources and education | 8 | 10 | 10 | 9 | . | | Research and development | 10 | 8 | 8 | 10 | . | | Rules | 7 | 4 | 5 | 10 | . | | Management | 9 | 7 | 8 | 7 | . | | FAVA | 10 | 5 | 8 | 7 | . | | Standard | 10 | 3 | 8 | 10 | . | | Hardware | Equipment | 8 | 6 | 7 | 8 | | | Infrastructure | 9 | 5 | 5 | 7 | | | Material | 7 | 2 | 5 | 5 | |
|
|